Tag

vulnerabilities

vulnerabilities page 1

wireless sierra es450 security vulnerability Vulnerabilities forensic analysis

Weakpoints in Sierra Wireless AirLink ES450 discovered

Cyber Security Researchers at CTG disclosed a dozen vulnerabilities affecting Sierra Wireless AirLink gateways and routers, including several serious flaws. Some of the flaws could be exploited to execute arbitrary code, modify passwords, and change system settings. Sierra Wireless AirLink gateways and routers are widely used in enterprise environments to connect industrial equipment, smart devices,...
Continue Reading
nvidia gpu display driver vulnerability hacking hack

American GPU Production Company Patches Display Driver Flaw

American Technology Company NVIDIA, designers of top graphics processing units – issued yet another security update to fix three high and medium severity security issues in the NVIDIA GPU Display Driver that could lead to code execution, denial of service, escalation of privileges, or information disclosure on vulnerable Windows machines. Even though to abuse the...
Continue Reading
wifi security vulnerability wpa3 dragonblood

New Wifi Security? What about the Dragonblood Vulnerabilities?

Yes, we have a new kid on the block, for Wi-Fi enthusiasts the better the security the safer they feel, and of course would make them surf more. Internet has been part of our daily lives, therefore securing our activities in the world of the cloud is something more to consider. WPA3 is said to...
Continue Reading
WordPress Yuzo Plugin Becomes Scamming Tool

WordPress Yuzo Plugin Becomes Scamming Tool

The Yuzo Related Posts plugin, which is installed on over 60,000 websites, was removed from the WordPress.org plugin directory on March 30, 2019 after an unpatched vulnerability was publicly, and irresponsibly, disclosed by a security researcher that same day.   The vulnerability, which allows stored cross-site scripting (XSS), is now being exploited in the wild....
Continue Reading
Sony smart TVs

Sony SMART TVs Expose WiFi Passwords

Security vulnerabilities in Android-based Sony smart TVs allow attackers to access WiFi Passwords and the images stored on the devices.   The vulnerability resides in the Photo Sharing Plus which allows users to upload photos to Sony Smart TV through a smartphone. It affects not only the TV’s used at the home but also the...
Continue Reading
GPU Channel

GPU Channel Attacks Pave Way for Data Theft

PC researchers at the University of California, Riverside have uncovered out of the blue how effectively assailants can utilize a PC’s illustrations handling unit, or GPU, to keep an eye on web movement, take passwords, and break into cloud-based applications. Marlan and Rosemary Bourns College of Engineering software engineering doctoral understudy Hoda Naghibijouybari and post-doctoral...
Continue Reading
vulnerabilities

New Bluetooth Protocol Chips Plagued by BleedingBit Bug

Two new zero-day vulnerabilities were found in Bluetooth Low-Energy (BLE) chips, which could uncover numerous endeavor firms from around the globe to remote code execution assaults. The arrangement of vulnerabilities were named as “Bleedingbit“. By abusing the bugs, an aggressor could possibly focus on a helpless framework found 100 to 300 feet away.   BLE...
Continue Reading
UAE Cyber Threats

UAE Cyber Threats and How Serious They Are

An aggregate of 276,000 vulnerabilities have been distinguished crosswise over 800,000 web confronting has in the UAE by DarkMatter Group, the provincial digital security consultancy. Its quarterly Cyber Security Report demonstrated that 93 percent of DarkMatter’s appraisals discovered obsolete programming and 83 percent found unsupported programming. The report likewise said that 70 percent of digital...
Continue Reading
Cameras

New Security Script Allows Insecure Cameras to be searched by IP Address

There’s no closure to the security bad dream that is the Internet of Things (IoT). Another apparatus created by a security scientist gives you a chance to seek uncertain reconnaissance cameras by essentially entering a location.   Named Kamerka, the apparatus consolidates information of cameras that are associated with the web with area information to...
Continue Reading
Data of Moscow’s Elite Leaked in Telecom Incident

Data of Moscow’s Elite Leaked in Telecom Incident

Thousands of wealthy Moscow residents who subscribed to a regional internet provider have had personal data including names, home addresses and mobile numbers posted online. People affected by the high-profile data leak are all clients of Moscow-based internet provider Akado Telecom, a large telecommunications network owned by billionaire businessman Viktor Vekselberg, which said it had...
Continue Reading